Analysis

  • max time kernel
    4294182s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20220223-en
  • submitted
    11-03-2022 01:06

General

  • Target

    3b2bc76df7efa683c4566cc2d86b7b3e094b953eccb6aee14229185c7ee58d0c.exe

  • Size

    552KB

  • MD5

    c22961455558772a3eb94b470560b9d5

  • SHA1

    9ab4977126485322978f549a30a6c76e9ea2596b

  • SHA256

    3b2bc76df7efa683c4566cc2d86b7b3e094b953eccb6aee14229185c7ee58d0c

  • SHA512

    d0426a2f5bb4ca1461fab19a5b003e27e955b1f9824824cd581d1671ed525147bc262e45812aba827d5955c50b9c631e97bd88ecf669866dc34a529c9c9918e2

Score
6/10

Malware Config

Signatures

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b2bc76df7efa683c4566cc2d86b7b3e094b953eccb6aee14229185c7ee58d0c.exe
    "C:\Users\Admin\AppData\Local\Temp\3b2bc76df7efa683c4566cc2d86b7b3e094b953eccb6aee14229185c7ee58d0c.exe"
    1⤵
      PID:1752

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1752-54-0x0000000076891000-0x0000000076893000-memory.dmp

      Filesize

      8KB

    • memory/1752-55-0x0000000074C30000-0x00000000751DB000-memory.dmp

      Filesize

      5.7MB

    • memory/1752-56-0x0000000002120000-0x0000000002121000-memory.dmp

      Filesize

      4KB